Cross-Domain Password-Based Authenticated Key Exchange Revisited

被引:6
作者
Chen, Liqun [1 ]
Lim, Hoon Wei [2 ]
Yang, Guomin [3 ]
机构
[1] HP Labs, Palo Alto, CA USA
[2] Nanyang Technol Univ, Singapore 639798, Singapore
[3] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
Password-based protocol; key exchange; cross-domain; client-to-client; SECURE; PROTOCOL; CRYPTANALYSIS; CLIENTS;
D O I
10.1145/2584681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share with their respective domain authentication servers. On the other hand, the authentication servers, assumed to be part of a standard PKI, act as ephemeral CAs that certify some key materials that the users can subsequently use to exchange and agree on as a session key. Moreover, we adopt a compositional approach. That is, by treating any secure two-party password-based key exchange (2PAKE) protocol and two-party asymmetric-key/symmetric-keybased key exchange (2A/SAKE) protocol as black boxes, we combine them to obtain generic and provably secure 4PAKE protocols.
引用
收藏
页数:32
相关论文
共 44 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], ACM T INFORM SYSTEM, V16
[3]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]  
[Anonymous], 2008, 5246 RFC
[5]   Cryptographically sound security proofs for basic and public-key Kerberos [J].
Backes, Michael ;
Cervesato, Iliano ;
Jaggard, Aaron D. ;
Scedrov, Andre ;
Tsay, Joe-Kai .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) :107-134
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[8]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[9]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[10]  
Bellare M., 1994, CRYPTO, P232